{"title":"Effect of Cyberattack on Event Detection Algorithm in Distribution System using Synchrophasor Measurements","authors":"S. Beura, B. Padhy","doi":"10.1109/NPSC57038.2022.10069376","DOIUrl":null,"url":null,"abstract":"Cyber-physical system (CPS) in the twenty-first century is paving new ways to have better connectivity among the power system devices, effective control, and improved reliability. Thus, manipulating this system by foreign interventions like false data injection (FDI) must be handled with utmost priority. Power system monitoring using micro phasor measurement units (μ PMUs) gives more insight into the transient performance of the system. Using the optimal placement of PMUs, minimum numbers of μ PMUs will ensure the complete observability of the power system. This comprehensive view of the system can be used to detect any event that occurs in the system. The measurements of μ PMUs connected to the end points of each radial line can be used to detect the event location. But, any FDI-type attack on these devices can degrade the result of the event detection algorithm. In this paper, we work on IEEE 33 bus system to find the effect of falsified μ PMU data on the event detection algorithm. This work presents attack detection using a tolerance limits violation in the presence of an attack. Further, attack effect mitigation on the μ PMU readings is inspected to find its detrimental effect on the detection algorithm. Finally, the manipulated μ PMUs are detected, and their readings are avoided to get the proper event location.","PeriodicalId":162808,"journal":{"name":"2022 22nd National Power Systems Conference (NPSC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 22nd National Power Systems Conference (NPSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NPSC57038.2022.10069376","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cyber-physical system (CPS) in the twenty-first century is paving new ways to have better connectivity among the power system devices, effective control, and improved reliability. Thus, manipulating this system by foreign interventions like false data injection (FDI) must be handled with utmost priority. Power system monitoring using micro phasor measurement units (μ PMUs) gives more insight into the transient performance of the system. Using the optimal placement of PMUs, minimum numbers of μ PMUs will ensure the complete observability of the power system. This comprehensive view of the system can be used to detect any event that occurs in the system. The measurements of μ PMUs connected to the end points of each radial line can be used to detect the event location. But, any FDI-type attack on these devices can degrade the result of the event detection algorithm. In this paper, we work on IEEE 33 bus system to find the effect of falsified μ PMU data on the event detection algorithm. This work presents attack detection using a tolerance limits violation in the presence of an attack. Further, attack effect mitigation on the μ PMU readings is inspected to find its detrimental effect on the detection algorithm. Finally, the manipulated μ PMUs are detected, and their readings are avoided to get the proper event location.